gfe-relnote: n/a.  Remove obsolete comment from test.

Follow-up to cl/309254981 and cl/309297734.  Test is known to work in Chromium
since it been enabled with TLS at
https://quiche.googlesource.com/quiche.git/+/b5a07a10762d9200b3185ae3e8a3f1038811258e
and rolled into Chromium at https://crrev.com/c/2174355.

PiperOrigin-RevId: 309398189
Change-Id: I77ad07978a4b1d1f374f30765253543d0ae01fe7
diff --git a/quic/core/http/end_to_end_test.cc b/quic/core/http/end_to_end_test.cc
index 37b75c0..4e29da5 100644
--- a/quic/core/http/end_to_end_test.cc
+++ b/quic/core/http/end_to_end_test.cc
@@ -1520,8 +1520,6 @@
   EXPECT_FALSE(send_alarm->IsSet());
 }
 
-// TODO(b/154151800): Needs to get turned back to EndToEndTest when we figure
-// out why the test doesn't work on chrome.
 TEST_P(EndToEndTest, InvalidStream) {
   ASSERT_TRUE(Initialize());
   EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());